Text-based content to make you shine through
Over the decades we have written content for organizations as big as Cisco and SAP and as small as individuals looking for a blog or an entire book. We have written blogs, articles, white papers, and full-sized books. We also write for other content agencies. What makes us unique is that we are not just wordsmiths; we understand the industry verticals that we write for, such as management, leadership, IT & cybersecurity, healthcare, and workplace issues. This means we know the culture and can speak the language.
We have written hundreds of articles and papers over the years. Samples of some of the most recent are listed below. Our portfolio of ghost-written material can be sent to you privately.
ChatGPT Polishing
Generative AI technologies like ChatGPT seem pretty amazing in their ability to create articles and text in seconds. But when you read it through a second time, it can seem, well, kind of bland. It's a great starting point for sure, but when it comes to conveying your particular brand and style, or even just choosing some different words and phrasing to make it sound less bland, that's where we come in. Think about it in terms of moving into new office space or a new home. It's nicely constructed, but the furnishings and artwork should reflect you.
A Small Sample of our Portfolio
Workplace-Work relatedDiversity, Equity, and Inclusion – The Centerpiece of Cyber | The IEEE Computer Society | March 11, 2024
Leadership Strategies for Eliminating Workplace Fear | Simon Alliance | September 12, 2022The Fear Factor | Market Impact Insights | September 7, 2022Working for yourself can mean more than opening your own business | Young Upstarts | August 31, 2022Addressing managers’ worries about the gaping void of supervision | TLNT | August 19, 2022Why Most Corporate Training Is A Waste—And A Liability | Chief Executive | August 16, 2022How Fear Inhibits Digital Transformation | GritDaily | August 5, 2022How to Protect the People You Love from Cybercrime | Innerself July 20, 2022Five ways fear can derail your digital transformation | The Enterprisers Project July 18, 2022Working from home doesn’t replace the office: it replaces the coffee shop | MS Career Girl July 7, 2022The Hacker’s Best Friend: Your Fear of Looking Stupid | USAWire June 29, 2022Five facts about work-from-home that management doesn’t want to admit | CEOWorld June 28, 2022Is Today the Day You Get Fired? Your Answer Should be “So What?” | CareerBright June 7, 2022How to Use Fear (Nicely) in Content Marketing | Managing Editor June 7, 2022
IT/CybersecurityWhat’s Your Formula For Digital Trust? | TechBullion | March 15, 2024 The Vendor of My Cloud-Vendor is My Friend | Techspective | January 23, 2024 The Quantum Computing Cryptopocalypse – I’ll Know It When I See It | Security Affairs | January 19, 2024 How to transform IT service delivery into an engine of employee delight | (Quoted in) CIO Magazine | July 11, 2022Dora4 Metrics for Mainframe DevOps | BMC Compuware | May 31, 2022Data Management in the Healthcare Industry | (Quoted in) CIO Magazine | May 2, 2022Git for the Mainframe (eBook) | BMC Compuware | February 28, 2022Bringing Cybersecurity to the Board and Vice Versa | (ISC)² | December 7, 2021Maximize the Benefits of Your CI/CD Pipeline by Including the Mainframe (eBook) | BMC Compuware | Nov 30, 2021Zero Touch PKI and the Great Resignation | Venafi | November 21, 2021Thales DSDC 2021 Report - The Evolving Role of the CIO | Thales | August 26, 2021Minimising the Impact of a Breach | Adarma | August 13, 2021Decisions, Decisions, and the Role of Authorization | (ISC)² | August 16, 2021A Safe and Secure Way to Decommission | (ISC)² | July 15, 2021Security Does Not End With Implementing Controls | (ISC)² | June 25, 2021
BusinessHow SMBs are using technology to turn crisis into opportunity | ITWC for Amazon Web Services | November 24, 2021
IT/CybersecurityWhat’s Your Formula For Digital Trust? | TechBullion | March 15, 2024 The Vendor of My Cloud-Vendor is My Friend | Techspective | January 23, 2024 The Quantum Computing Cryptopocalypse – I’ll Know It When I See It | Security Affairs | January 19, 2024 How to transform IT service delivery into an engine of employee delight | (Quoted in) CIO Magazine | July 11, 2022Dora4 Metrics for Mainframe DevOps | BMC Compuware | May 31, 2022Data Management in the Healthcare Industry | (Quoted in) CIO Magazine | May 2, 2022Git for the Mainframe (eBook) | BMC Compuware | February 28, 2022Bringing Cybersecurity to the Board and Vice Versa | (ISC)² | December 7, 2021Maximize the Benefits of Your CI/CD Pipeline by Including the Mainframe (eBook) | BMC Compuware | Nov 30, 2021Zero Touch PKI and the Great Resignation | Venafi | November 21, 2021Thales DSDC 2021 Report - The Evolving Role of the CIO | Thales | August 26, 2021Minimising the Impact of a Breach | Adarma | August 13, 2021Decisions, Decisions, and the Role of Authorization | (ISC)² | August 16, 2021A Safe and Secure Way to Decommission | (ISC)² | July 15, 2021Security Does Not End With Implementing Controls | (ISC)² | June 25, 2021
BusinessHow SMBs are using technology to turn crisis into opportunity | ITWC for Amazon Web Services | November 24, 2021
Business Books
We are experts in creating business books. Even if all you have is a collection of notes and PowerPoint decks, we can manage and assemble a compelling book, audio book, and promotional social media campaign (blogs & tweets) that you will be proud of. Contact us for a private conversation in which we can show you some of our past ghostwriting projects.
Bristall Company owner/founder Steve Prentice is a published author of the books used in our courses.